www.soundshore.nethubfssoundshore-siteheader-img-2

The Next Level Network Blog

IT Management, Security, Compliance for Regulated Firms

Bezos Phone Hack Shows It Can Happen to Anyone – Here’s How to Protect Your Business

Feb 18, 2020 9:00:00 AM / by Liege Payne, Director of Sales & Business Development posted in Mobile Device Management (MDM), MDM, cyber security, BYOD, corporate security

0 Comments

Consider Training and Mobile Device Management to Safeguard Employee Devices

No doubt you’ve heard the big cyber security news story that broke last month – back in 2018, the iPhone belonging to Amazon founder and CEO Jeff Bezos was allegedly hacked when he clicked a video sent through WhatsApp by Saudi Crown Prince. The video was supposedly infected with malware, which then allowed the hackers access to the leaked data on Bezos’ phone over several months.

Read More

In a World of Cyber Threats You MUST Vet IT Support Providers

Feb 3, 2020 9:00:00 AM / by Liege Payne, Director of Sales & Business Development posted in IT Support, cyber security, IoT Cyber Attacks

0 Comments

A Cautionary Tale and What to Ask

We just heard a hair-raising tale of what happened to a company that was too trusting in hiring tech assistance. It made us decide to write a post about why, in a world of cyber threats, you MUST carefully vet IT support providers and what you should ask before bringing them on board. This advice goes in spades for regulated firms.

Read More

Announcing Soundshore’s 2020 IT Support and Services Growth Plans

Jan 30, 2020 9:00:00 AM / by Eric Benda, CEO posted in IT Support, Soundshore Technology Group, Telecom services, Managed Services Providers

0 Comments

Expanding Managed IT Services and Support, Adding Telecom Services in Conn, New York, Dallas, Los Angeles and San Francisco

The year 2020 promises to be an exciting one for STG and our clients as we expand IT support and services in all of our markets – Connecticut, New York City and environs, Dallas, Los Angeles and San Francisco. In addition to increasing staffing – remote and feet-on-the-ground – we’re adding telecom to our array of services.

Read More

Data Creep and Function Creep Are Challenging Online Privacy and Security

Jan 23, 2020 2:12:21 PM / by Jennifer Valle, Director of Cyber Security and Client Relations posted in data privacy, data creep

0 Comments

What to Consider When Trading Personal Info for Content and Convenience

Two growing phenomena of our Internet-connected world – data creep and function creep – are compromising online privacy and security for both companies and individuals. We’ll define these terms shortly, but first some preliminary context.

Read More

Self-Service Purchase Option for Microsoft Power Platform Apps Starts Jan. 14, 2020, Poses Compliance Risk

Jan 6, 2020 2:00:52 PM / by Eric Benda, CEO posted in Microsoft Power Platform, PowerShell Modules, Compliance Risk

0 Comments

New PowerShell Module Can Block This Option, Prevent “Shadow IT;” Act Now

Around mid-October, 2019, Microsoft announced that as of November 19th it would make its Power Platform applications Power BI, Power Apps and Flow – available for self-service purchase by business users in the US. The announcement was met by solid pushback from both in-house and outsourced IT support pros who recognized that this move could cause what would amount to a “shadow IT” layer within companies and – of particular importance to our regulated customers – serious compliance problems.

Read More

A Complete Guide to Using Backupify to Help Ensure Business Continuity

Jan 2, 2020 1:18:05 PM / by Liege Payne, Director of Sales & Business Development posted in Business Continuity, DATTO, Backupify, Backup Solutions

0 Comments

Free eBook: Defending Your Office 365 Data: Five Threats That Microsoft Can’t Defend Against, But You Can

Recently, our business continuity and backup (via its Backupify) solutions partner Datto was a presenter at a cyber security conference where there was also a demo by Kevin Mitnick. Kevin is one of the world's best-known hackers – formerly a notorious and most-wanted hacker and now on the “white hat” side of the business as the “Chief Hacking Officer” at our cyber security solutions partner KnowBe4.

Read More

Get This Free eBook: “Financial Services Firm? Add Business Continuity to your Bottom Line”

Dec 10, 2019 12:40:47 PM / by Eric Benda, CEO posted in Disaster Recovery, Business Continuity, DATTO

0 Comments

Why Every Investment and Advisory Firm Must Have an Up-to-date Business Continuity Plan

We recently presented a webinar, “What You Need to Know About Backup and Continuity.” Now we’re offering an informative eBook that focuses on the “why” of business continuity planning – as it relates specifically to regulated firms. We’re presenting, “Financial Services Firm? Add Business Continuity to your Bottom Line” as a complimentary download in collaboration with our business continuity solutions partner, DATTO.

Read More

SIM Swapping: A New Cyber Attack via Your Mobile Phone

Dec 4, 2019 11:03:29 AM / by Eric Benda, CEO posted in Mobile Device Management (MDM), cybersecurity, SIM Swap Attack, SIM Swapping, SIM Swap

0 Comments

Don’t Use Your Cell for 2FA – And Other Precautions

We’re not kidding when we say that cyber threats are evolving at a crazy, rapid clip. In this post we’ll tell you about a relatively recent one called SIM Swapping that is quite troubling.

Read More

Recent NY SHIELD Act Beefs Up Cyber Security for State Citizens

Nov 26, 2019 8:30:00 AM / by Liege Payne, Director of Sales & Business Development posted in Security, cyber security, legislature

0 Comments

What Businesses Everywhere Should Know About New NY Data Protection Law Compliance

New York state recently enacted a robust amendment to existing NY data protection law. Known as the NY SHIELD Security Act (Senate Bill S5575B), it applies to any company that has access to or stores personal or private customer or employee data of New York residents. By the way, SHIELD is an acronym for Stop Hacks and Improve Electronic Data.

Read More

Windows Autopilot Provides Improved Out-of-box Experience for Users

Nov 1, 2019 3:10:41 PM / by Eric Benda, CEO posted in Microsoft Security, Windows Autopilot, Device Configuration

0 Comments

Automated Device Configuration Solution Also Creates IT Department Efficiencies

One-by-one. One-at-a-time. That’s how we as an IT support outsource, as well as in-house IT departments have always configured new devices for company employees – or reconfigured devices for re-use by another employee. The result of manual device configuration has been a delay in getting new technology into the hands of employees – thus a delay in the potential productivity it adds.

Read More